6.8
CVSSv2

CVE-2015-2995

Published: 08/06/2015 Updated: 09/10/2018
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 690
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

The RdsLogsEntry servlet in SysAid Help Desk prior to 15.2 does not properly check file extensions, which allows remote malicious users to upload and execute arbitrary files via a NULL byte after the extension, as demonstrated by a .war%00 file.

Vulnerable Product Search on Vulmon Subscribe to Product

sysaid sysaid

Exploits

SysAid Help Desk version 144 suffers from code execution, denial of service, path disclosure, remote file upload, remote SQL injection, directory traversal, file download, and various other vulnerabilities ...
>> Multiple vulnerabilities in SysAid Help Desk 144 >> Discovered by Pedro Ribeiro (pedrib@gmailcom), Agile Information Security ================================================================================= Disclosure: 03/06/2015 / Last updated: 10/06/2015 >> Background on the affected product: "SysAid is an ITSM solution t ...
## # This module requires Metasploit: metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' require 'zlib' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient include Msf::Exploit::FileDropper def initialize(info = {} ...